Browse Items (11858 total)
Sort by:
-
Enhanced Security in Payment Gateways Through Face Detection: An Advanced Approach Using DenseNet 121- BiLSTM Models
Because it is one of the most promising applications of image analysis, face recognition has been the subject of intense research and development for many decades. Many modern identification and verification requirements have found a potential new home with the introduction of face recognition (FR) technology. Facial recognition is just one of numerous uses for biometric pattern recognition algorithms. Sequencing is essential for many tasks, including as feature extraction, model training, and preprocessing. Eliminating background noise and obtaining dense vertical edges are part of the preprocessing procedures. Facial feature extraction will be employed to extract features after feature extraction. Use attributes cautiously when training a Desnet121-BiLSTM model. In every respect, the suggested method outperforms two state-of-the-art algorithms, Desnet121 and BiLSTM. An accuracy rating of 97.19% was indicative of a considerable improvement in the figures. 2024 IEEE. -
Enhanced Security for Large-Scale 6G Cloud Computing: A Novel Approach to Identity based Encryption Key Generation
Cloud computing and 6G networks are in high demand at present due to their appealing features as well as the security of data stored in the cloud. There are various challenging methods that are computationally complicated that can be used in cloud security. Identity-based encryption (IBE) is the most widely used techniques for protecting data transmitted over the cloud. To prevent a malicious attack, it is an access policy that restricts access to legible data to only authorized users. The four stages of IBE are setup, key extraction or generation, decryption and encryption. Key generation is a necessary and time-consuming phase in the creation of a security key. The creation of uncrackable and non-derivable secure keys is a difficult computational and decisional task. In order to prevent user identities from being leaked, even if an opponent or attacker manages to encrypted material or to decode the key this study presents an advanced identity-based encryption technique with an equality test. The results of the experiments demonstrate that the proposed algorithm encrypts and decrypts data faster than the efficient selective-ID secure IBE strategy, a competitive approach. The proposed method's ability to conceal the identity of the user by utilizing the Lagrange coefficient, which is constituted of a polynomial interpolation function, is one of its most significant aspects. 2023 The Authors. Published by AnaPub Publications. This is an open access article under the CC BY-NC-ND license. (http://creativecommons.org/licenses/by-nc-nd/4.0/) -
Enhanced Secure Technique for Detecting Cyber Attacks Using Artificial Intelligence and Optimal IoT
The Internet of Things (IoT) is a broad term that refers to the collection of information about all of the items that are linked to the Internet. It supervises and controls the functions from a distance, without the need for human interaction. It has the ability to react to the environment either immediately or via its previous experiences. In a similar vein, robots may learn from their experiences in the environment that is relevant to their applications and respond appropriately without the need for human interaction. A greater number of sensors are being distributed across the environment in order to collect and evaluate the essential information. They are gaining ground in a variety of industries, ranging from the industrial environment to the smart home. Sensors are assisting in the monitoring and collection of data from all of the real-time devices that are reliant on all of the different types of fundamental necessities to the most advanced settings available. This research study was primarily concerned with increasing the efficiency of the sensing and network layers of the Internet of Things to increase cyber security. Due to the fact that sensors are resource-constrained devices, it is vital to provide a method for reacting, analysing, and transmitting data collected from the sensors to the base station as efficient as possible. Resource requirements, such as energy, computational power, and storage, vary depending on the kind of sensing devices and communication technologies that are utilised to link real-world objects together. Sensor networks' physical and media access control layers, as well as their applications in diverse geographical and temporal domains, are distinct from one another. Transmission coverage range, energy consumption, and communication technologies differ depending on the application requirements, ranging from low constraints to high resource enrich gadgets. This has a direct impact on the performance of the massive Internet of Things environment, as well as the overall network lifetime of the environment. Identifying and communicating matching items in a massively dispersed Internet of Things environment is critical in terms of spatial identification and communication. 2022 Anand Kumar et al. -
Enhanced radial basis function neural network for tomato plant disease leaf image segmentation
Primary crop losses in agriculture are due to leaf diseases, which farmers cannot identify early. If the diseases are not detected early and correctly, then the farmer will have to undergo huge losses. Therefore, in the field of agriculture, the detection of leaf diseases in tomato crops plays a vital role. Recent advances in computer vision and deep learning techniques have made disease prediction easy in agriculture. Tomato crop front side leaf images are considered for research due to their high exposure to diseases. The image segmentation process assumes a significant role in identifying disease affected areas on tomato leaf images. Therefore, this paper develops an efficient tomato crop leaf disease segmentation model using an enhanced radial basis function neural network (ERBFNN). The proposed ERBFNN is enhanced using the modified sunflower optimization (MSFO) algorithm. Initially, the noise present in the images is removed by a Gaussian filter followed by CLAHE (contrast-limited adaptive histogram equalization) based on contrast enhancement and un-sharp masking. Then, color features are extracted from each leaf image and given to the segmentation stage to segment the disease portion of the input image. The performance of the proposed ERBFNN approach is estimated using different metrics such as accuracy, Jaccard coefficient (JC), Dice's coefficient (DC), precision, recall, F-Measure, sensitivity, specificity, and mean intersection over union (MIoU) and are compared with existing state-of-the-art methods of radial basis function (RBF), fuzzy c-means (FCM), and region growing (RG). The experimental results show that the proposed ERBFNN segmentation model outperformed with an accuracy of 98.92% compared to existing state-of-the-art methods like RBFNN, FCM, and RG, as well as previous research work. 2022 Elsevier B.V. -
Enhanced Process Model and Analysis of Risk Integration in Software effort estimation
The development of software within the estimated effort is remaining as a challenging task. The process of effort estimation is a critical activity in a software project, where effort estimates are utilized to arrive at the schedule, resources, and cost. Though many software effort estimation techniques exist, effort overrun occurs in a project. Identification of risks and their consideration in software lifecycle activities play a significant role in the successful execution of a software project. It would be required to account for uncertainty and the key factors that contribute to it. This study focuses on the need to include project risk score in the software effort estimation process to arrive at better effort estimates. This paper depicts the standard and enhanced process frameworks for estimation of software development efforts. A multi-layer perceptron model was built and the results indicated the relevance of considering project risk score in the effort estimation process. The usage of an enhanced gradient boosting technique for predictive modelling revealed a decrease in standard deviation of the residuals, thus indicating a better fit for the effort estimation model through integration of risks. 2019 IEEE. -
Enhanced power quality control of a photo voltaic power plant integrated with multiple electric vehicle
As there is a great need for high-quality electricity on the distribution side, distribution side generation (DSG) has become increasingly important. The increased weight of EVs on the distribution side is the cause of this. There are numerous power quality mitigation techniques employed to address this type of issue, but many of the solutions suggest the usage of a separate device, such as an active power filter. But while construction the DSG the solution to this problem may be addressed using the proposed solution in this paper. Power quality (PQ) problems are being caused by the grids integration of Photo-Voltaic (PV) and its application to all connected loads. With the aid of Direct Quardrature (DQ) controller and Multicarrier Space Vector Pulse Width Modulation (SVPWM) technology, the overall power quality disturbance is decreased. A Simulink model for the PV-EV-Grid system was built to measure voltage and current Total Harmonic Distortion (THD) percentages under linear, non-linear, and Plug in Hybrid Vehicle (PHEV) load situations. The model shows that the THD values are well within the IEEE 519. Indian Academy of Sciences 2024. -
Enhanced Postoperative Brain MRI Segmentation with Automated Skull Removal and Resection Cavity Analysis
Brain tumors present a significant medical challenge, often necessitating surgical intervention for treatment. In the context of postoperative brain MRI, the primary focus is on the resection cavity, the void that remains in the brain following tumor removal surgery. Precise segmentation of this resection cavity is crucial for a comprehensive assessment of surgical efficacy, aiding healthcare professionals in evaluating the success of tumor removal. Automatically segmenting surgical cavities in post-operative brain MRI images is a complex task due to challenges such as image artifacts, tissue reorganization, and variations in appearance. Existing state-of-the-art techniques, mainly based on Convolutional Neural Networks (CNNs), particularly U-Net models, encounter difficulties when handling these complexities. The intricate nature of these images, coupled with limited annotated data, highlights the need for advanced automated segmentation models to accurately assess resection cavities and improve patient care. In this context, this study introduces a two-stage architecture for resection cavity segmentation, featuring two innovative models. The first is an automatic skull removal model that separates brain tissue from the skull image before input into the cavity segmentation model. The second is an automated postoperative resection cavity segmentation model customized for resected brain areas. The proposed resection cavity segmentation model is an enhanced U-Net model with a pre-trained VGG16 backbone. Trained on publicly available post-operative datasets, it undergoes preprocessing by the proposed skull removal model to enhance precision and accuracy. This segmentation model achieves a Dice coefficient value of 0.96, surpassing state-of-the-art techniques like ResUNet, Attention U-Net, U-Net++, and U-Net. (2024) Sobha Xavier P., Sathish P. K. and Raju G. -
Enhanced photocatalytic activity of La3+ doped bicrystalline titania prepared via combustion method for the degradation of cationic dye under solar illumination
La3+ doped TiO2 photocatalysts were successfully synthesized by combustion method in the presence of urea and were characterized by various physico-chemical techniques. Further, the photocatalytic performance of the synthesized catalysts was monitored by photocatalytic degradation of synthetic cationic dye-Methylene Blue (MB) under solar illumination. The bicrystalline phase of anatase and rutile was confirmed by X-ray diffraction analysis. Moreover, the transformation from anatase to rutile phase proceeds at a slower rate in the La3+ doped TiO2 catalysts. Effective separation of charge carriers, a synergistic effect in the bicrystalline framework of anatase and rutile, smaller crystallite size, and higher concentration of surface adsorbed hydroxyl groups helped these catalysts to show improved activity for the dye degradation. Copyright 2018 BCREC Group. All rights reserved. -
Enhanced Multi-Model Approach for Motion and Violence Detection using Deep Learning Methods Using Open World Video Game Dataset
For today's environment, it is extremely important to understand hostility and motion in a variety of contexts, particularly where accidents are concerned. There's also a high safety risk in public places if there is no proper identification of suspicious activities that occur fast and cannot be accurately observed through traditional surveillance systems that rely on constant human monitoring. Although deep learning algorithms have proven useful for detecting anomalies such as fraud recently, there has been little research on real-time crime detection because of issues related privacy when using live data sets. To tackle the key problem of motion and violence detection with current deep learning methods, this work exploits the Open World Game Dataset which provides realistic activities. The reliance on only one technique undermined the previous models' accuracy while this study comes up with various models to raise the detection precision and real-time processing capability. This work applies MobileNet SSD, YOLOv8 (You Only Look Once), and SSD (Single Shot MultiBox Detector) techniques to create a more accurate movement detection system. To identify violent or illegal behavior from videos, 3D convolutional neural networks (3DCNN) will be used alongside attention approaches. A diverse inexpensive training environment that enables simulating. 2024 IEEE. -
Enhanced Lumpy Cattle Skin Disease Prognosis via Deep Learning Methods
Animal illness is growing in importance. Identification of the illness is important since various diseases may affect different animals, and immediate guidance will be provided. Cows with lumpy skin issues are caused by the Neethling infection. The affection of these diseases causes lasting injury to the cattle's skin. Reduced Poor growth, reversal, milk production, gravidity, and, in severe cases, mortality are the most common adverse consequences of the illness. We developed a deep learning-based architecture that can predict or recognize disease. A deep literacy system is required to identify the microorganism causing the lumpy skin disease. This system collects diverse cattle electronic medical records and uses data analysis to create an intelligent diagnosis system for cattle diseases. It involves text preprocessing to enhance data quality, and the ECLAT algorithm correlates disease names with probabilities, providing tailored treatment plans. The system ensures timely disease treatment, reducing herders' losses and promoting scientific intelligence in animal husbandry. 2024 IEEE. -
Enhanced Light Scattering Using a Two-Dimensional Quasicrystal-Decorated 3D-Printed Nature-Inspired Bio-photonic Architecture
A number of strategies have been exploited so far to trap photons inside living cells to obtain high-contrast imaging. Also, launching light inside biological materials is technically challenging. Using photon confinement in a three-dimensional (3D)-printed biomimetic architecture in the presence of a localized surface plasmon resonance (LSPR) promoter can overcome some of these issues. This work compares optical confinement in natural and 3D-printed photonic architectures, namely, fish scale, in the presence of atomically thin Al70Co10Fe5Ni10Cu5 quasicrystals (QCs). Due to their wideband LSPR response, the QCs work as photon scattering hotspots. The architecture acts as an additive source of excitation for the two-dimensional (2D) QCs via total internal reflection (TIR). The computational analysis describes the surface plasmon-based scattering property of 2D QCs. The 3D-printed fish scale's image contrast with the 2D Al70Co10Fe5Ni10Cu5 QC has been compared with other 2D materials (graphene, h-BN, and MoS2) and outperforms them. The present study conceptually presents a new approach for obtaining high-quality imaging of biological imaging, even using high-energy photons. 2023 American Chemical Society. -
Enhanced Level Brain Tumor Identification Using CNN, VGG16 and ResNet Models
The comprehension of brain growths is significantly improved through the identification and categorization of these disorders. Still, their discovery is relatively grueling due to their variability in terms of position, shape, and size. Fortunately, deep literacy has revolutionized the field and significantly improved recognition, prediction, and opinion in various healthcare areas, including brain excrescences. The main goal of this study is to thoroughly review exploration that utilizes CNN, VGG16, and RESNET infrastructures to classify brain excrescences using MRI images. The performance of these models varied significantly, with CNN, VGG16, and RESNET achieving an emotional delicacy of 99.6. Additionally, ResNet and VGG16 achieved rigor of 92.4 and 89.7 independently. Likewise, the visualization of the decision-making processes of these models has provided valuable insight into the features they prioritize. By incorporating these models into their practice, healthcare professionals have the opportunity to enhance their individual capabilities, eventually leading to improved patient outcomes. 2024 IEEE. -
Enhanced Learning in IoT-Based Intelligent Plant Irrigation System for Optimal Growth and Water Management
This research looked at the transformative potential of cutting-edge machine learning algorithms in various areas of precision agriculture, with an emphasis on enhancing smart irrigation systems for onion farming. Using a vast sensor network and real-time monitoring, we investigated the performance of CNN, ANN, and SVM, three well-known machine learning algorithms. After extensive testing and investigation, our results reveal that CNN beats ANN and SVM in terms of outstanding accuracy in predicting plant water requirements. Because of CNN's superior predictive powers, our intelligent irrigation system maintains perfect soil conditions, resulting in increased agricultural yields and resource savings. The study's findings have important implications for modern agriculture, paving the way for data-driven, sustainable agricultural methods that address global concerns such as food security and environmental sustainability. As we approach the era of smart agriculture, our research demonstrates how technology has the potential to alter crop farming and aid in the development of a more resilient and successful agricultural industry. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
Enhanced Jaya Optimization Algorithm with Deep Learning Assisted Oral Cancer Diagnosis on IoT Healthcare Systems
Recently, healthcare systems integrate the power of deep learning (DL) models with the connectivity and data processing capabilities of the Internet of Things (IoT) to enhance the early recognition and diagnosis of disease. Oral cancer diagnosis comprises the detection of cancerous or pre-cancerous abrasions in the oral cavity. Timely identification is essential for successful treatment and enhanced prognosis. Here is an overview of the key aspects of oral cancer diagnosis. One potential benefit of utilizing DL for oral cancer detection is that it analyses huge counts of data fast and accurately, and it could not need clear programming of the rules for recognizing abnormalities. This can create the procedure of detecting oral cancer more effective and efficient. Thus, the study presents an Enhanced Jaya Optimization Algorithm with Deep Learning Based Oral Cancer Classification (EJOADL-OCC) method. The presented EJOADL-OCC method aims to classify and detect the existence of oral cancer accurately and effectively. To accomplish this, the presented EJOADL-OCC method initially exploits median filtering for the noise elimination. Next, the feature vector generation process is performed by the residual network (ResNetv2) model with EJOA as a hyperparameter optimizer. For accurate classification of oral cancer, a continuously restricted Boltzmann machine with a deep belief network (CRBM-DBN) model. The simulated validation of the EJOADL-OCC algorithm is tested by the series of simulations and the outcome demonstrates its supremacy over present DL approaches. 2024, American Scientific Publishing Group (ASPG). All rights reserved. -
Enhanced Horse Optimization Algorithm Based Intelligent Query Optimization in Crowdsourcing Systems
Crowdsourcing is a strategy of collecting information and knowledge from an abundant range of individuals over the Internet in order to solve cognitive or intelligence intensive challenges. Query optimization is the process of yielding an optimized query based upon the cost and latency for a given location based query. In this view, this article introduces an Enhanced Horse Optimization Algorithm based Intelligent Query Optimization in Crowdsourcing Systems (EHOA-IQOCSS) model. The presented EHOA-IQOCSS model mainly based on the enhanced version of HOA using chaotic concepts. The proposed model plans to accomplish a better trade-off between latency and cost in the query optimization process along with answer quality. The EHOA-IQOCSS is used to compute the Location-Based Services (LBS) namely K-Nearest Neighbor (KNN) and range queries, where the Space and Point of Interest (POI) can be obtained by the conviction level computation. The comparative study stated the betterment of the EHOA-IQOCSS model over recent methods. 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
Enhanced Geographical Information System Architecture for Geospatial Data
[No abstract available] -
Enhanced Energy-Efficient Routing for Wireless Sensor Network Using Extended Power-Efficient Gathering in Sensor Information Systems (E-PEGASIS) Protocol
Recent technological advancements in wireless communication and sensors made Wireless Sensor Networks (WSNs) as one of the demanding platforms in the current scenario. In WSN, tiny sensor nodes are collecting and monitoring the biological data or physical data or environmental data and transmits to the Base Station (BS) through gateway routers. These data can be accessed anywhere and anytime. Usually, sensor nodes have restrained battery power which creates the rigorous lifetime duration issues in WSN. Sensor nodes can transmit the data with each other using various routing protocols. Data transmission devours more amounts of energy and power. So, energy preservation is an important factor in WSN. There are plenty of researches going on in designing less energy consuming protocols for data transmission which helps to increase the lifetime of WSN. In this manuscript, we have proposed Extended Power-Efficient Gathering in Sensor Information Systems (E-PEGASIS) protocol for enhanced energy-efficient data transmission based on PEGASIS protocol. In this proposed method, the average distance between the sensor nodes is considered as the criterion for chaining and fixing the outermost nodes radio range value to the base station. Later it chains the related nodes available in the radio range. Consequently, the chained node checks their distance with the next nearest end node to go on with the chaining procedure which will enhance the performance of data transmission amid the base station and sensor node. The simulation of the proposed work shows that lifetime of the network is increased when compared to the LEACH and PEGASIS protocol. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Enhanced Energy Efficient Routing for Wireless Sensor Network Using Extended Power Efficient Gathering in Sensor Information Systems (E-PEGASIS) Protocol
Recent technological advancement in wireless communication and sensors made Wireless Sensor Networks (WSNs) as one of the demanding platforms in the current scenario. In WSN, tiny sensor nodes are collecting and monitoring the biological data or physical data or environmental data and transmitted to the base station (BS) through gateway routers. These data can be accessed anywhere and anytime. Usually sensor nodes have restrained battery power which creates the rigorous lifetime duration issues in WSN. Sensor nodes can communicate with each other using various routing protocols. Data transmission devours more amounts of energy and power. So, energy preservation is an important factor in WSN. There are plenty of researches going on in designing less energy consuming protocols for data transmission which helps to increase the lifetime of WSN. In this paper we have proposed Extended Power Efficient Gathering in Sensor Information Systems (E-PEGASIS) protocol for enhanced energy efficient data transmission based on PEGASIS protocol. In this proposed method average distance between the sensor nodes are considered as the criterion for chaining and fix the outermost node's radio range value the base station. Later it chains the related nodes available in the radio range. Consequently, the chained node checks their distance with the next nearest end node to go on with the chaining procedure which will enhance the performance of data transmission between the sensor node and the base station. The simulation of the proposed work shows that lifetime of the network is increased when comparing to the LEACH and PEGASIS protocol. 2021 The Authors. Published by Elsevier B.V. -
Enhanced encryption technique for secure iot data transmission
Internet of things is the latest booming innovation in the current period, which lets the physical entity to process and intervene with the virtual entities. As all the entities relate to each other, it generates load of data, which lacks proper security and privacy standards. Cryptography is one of the domains of Network Security, which is one such mechanism that helps the data transmission process to be secure enough over the wireless or wired channel and along with that, it provides authenticity, confidentiality, integrity of data and prevents repudiation. In this paper, we have proposed an alternate enhanced cryptographic solution combing the characteristic of symmetric, asymmetric encryption algorithms and Public Key Server. Here, the key pairs of end points (Users Device and IoT device) are generated using Elliptic Curve Cryptography and the respective public keys are registered in Public Key Server along with their unique MAC address. Thereafter, both the ends will agree on one common private secret key, which will be the base for further cryptographic process using AES algorithm. This model can be called as multi-phase protection mechanism. It will make the process of data transmission secure enough that no intermediate can tamper the data. Copyright 2019 Institute of Advanced Engineering and Science. All rights reserved. -
Enhanced electrical properties of CuO:CoO decorated with Sm2O3 nanostructure for high-performance supercapacitor
In the present investigation, we have synthesized samarium (Sm) nanoparticles (NPs) and anchored them onto the surface of CuO:CoO nanostructure (NS) by utilizing a simple chemical precipitation method. Nanostructures (NS) were characterized utilizing powdered X-ray diffraction (XRD), Fourier transform infrared spectroscopy (FT-IR), X-ray photoelectron spectroscopy (XPS), scanning electron spectroscopy (SEM), transmission electron spectroscopy (TEM), UVvisible spectroscopy (UVVis), and BrunauerEmmettTeller (BET) studies. Resulting Smx CuO: CoO (x = 1%, 5%, 10%, and 12%) NS were investigated for their anomalous electrical and supercapacitive behavior. NS energy storage performance was experimentally determined using cyclic voltammetry (CV), galvanostatic chargedischarge (GCD), and electrochemical impedance spectroscopy (EIS). Sm10%CuO:CoO exhibited better electrochemical response than other samples and showed a maximum specific capacitance of 283.6F/g at 0.25A/g in KOH electrolyte. However, contrary to our expectation, NS displayed rectifying nature in I-V, intercalative nature in C-V, and polaronic permittivity in all concentrations of Sm2O3 doping as compared with undoped CuO:CoO NS. The outstanding properties of Smx CuO:CoO NS are attributed to the synergy of high charge mobility of Sm NPs, leading to significant variation in dielectric permittivity, currentvoltage (I-V) response, capacitancevoltage (C-V) behavior, with the formation of Sm3+ ionic cluster. The clusters lead to a change in dipole moment creating a strong local electric field. Additionally, a CR2032 type symmetric supercapacitor cell was fabricated using Sm10%CuO:CoO, which exhibited a maximum specific capacitance of 67.4F/g at 0.1A/g. The cell was also subjected to 5000 GCD cycles where it retained 96.3% Coulombic efficiency. Graphical Abstract: [Figure not available: see fulltext.] 2022, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.
